## Introduction of Decision Trees

Decision Tree:Overview in different kinds of supervised data mining techniques the decision trees are one of the most popular classification and prediction technique. basically the training data samples are organized in form of tree data structure. where the nodes of tree shows the attributes of the data set and edges can be used for demonstrating the values of these attributes. additionally the leaf node of the tree contains the decisions of ...

Happy Father’s Day
/ June 17, 2018

Fathers, do not provoke or irritate or fret your children [do not be hard on them or harass them], lest they become discouraged and sullen and morose and feel inferior and frustrated. Do not break their spirit. One of the greatest gifts a father can give his child is time! Time spent playing, reading, talking, laughing. Children crave that attention and become downcast when it doesn’t happen. Father’s Day is celebrated worldwide to r...

What are Cryptocurrencies in Digital World?
Technology & Science / June 16, 2018

Cryptocurrencies have increasingly become all the rage in digital currency market. Although blockchain’s decentralise and unregulated platform has resulted in the creation of hundreds of new cryptocurrencies, this has also led to the digital currency market becoming somewhat unstable. Over the past couple of years, popular cryptocurrencies such as Bitcoin, Ethereum, Monero, and ZCash, among others saw massive fluctuations in their va...

What is Classless Inter-Domain Routing (CIDR) in Networking?
/ June 14, 2018

Understanding networking is a fundamental part of configuring complex environments on the internet. This has implications when trying to communicate between servers efficiently, developing secure network policies, and keeping your nodes organized. CIDR (Classless Inter-Domain Routing) was introduced in 1993 replacing the previous generation of IP address syntax – classful networks. CIDR allowed for more efficient use of IPv4 address ...

What is Proxy Server in Networking?
/ June 12, 2018

A computer can act on the behalf of other computers to request content from the Internet or an intranet. Proxy Server is placed between a user’s machine and the Internet. It can act as a firewall to provide protection and as a cache area to speed up Web page display. Proxy server is a computer that sits between a client computer and the Internet, and provides indirect network services to a client. It may reside on the user̵...

What is Deadloack in Operating System?
Technology & Science / June 10, 2018

A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. Deadlocks are a set of blocked processes each holding a resource and waiting to acquire a resource held by another process. Because all the processes are waiting, none of them will ever cause any of the events that could wake up any of the other members of the set, and all the processes continue to wait ...

What is Digital Certificate in Network Security?
/ June 9, 2018

Digital certificates are a core component in the provision of secure data communications. Gaining an understanding of the nature, creation and operation as well as the variety of these certificates is an essential step for students of computer, information or network security. Digital Certificates provide a means of proving your identity in electronic transactions; much like a driver license or a passport does in face-to-face interac...

What is Multimedia Communication in Computer Graphics?
/ June 8, 2018

Multimedia communication deals with the transfer, the protocols, services and mechanisms of discrete media data (such as text and graphics) and continuous media data (like audio and video) in/over digital networks. Multimedia systems have attracted much attention during the last few years in the society as a whole and in the information technology field in particular. Multimedia communication comprises the techniques needed for distr...

What is Network Time Protocol (NTP) in networking?
/ June 7, 2018

Network Time Protocol (NTP) is very important for modern networks. If the time across network devices is not accurate, this can have a direct impact on network security and network management, just to name two. The key to accurate time in the network is to have your devices receive the correct time from an atomic clock, and then synchronize this correct time across all of the devices. Network Time Protocol ensures this process is aut...

What is CORBA in Distributed System?
/ June 6, 2018

In recent years, with the growing maturity and application of new technologies such as software architecture, software component, large-granularity software reuse and so on, software engineering methodology based on product line, which rises the widespread concern and attention, has become a hot and key topic in software engineering field. ORBA is often described as a “software bus” because it is a software-based communic...

World Environmental Day
/ June 5, 2018

Humans are both creatures and moulders of their environment, which gives them physical sustenance and affords them the opportunity for intellectual, moral, social and spiritual growth. In the long and tortuous evolution of the human race on this planet a stage has been reached when, through the rapid acceleration of science and technology, humans have acquired the power to transform their environment in countless ways and on an unpre...

Insert math as
Formula color
Type math using LaTeX
Preview
$${}$$
Nothing to preview
Insert